Cryptography I
The purpose of Telenet is to remote login. It is insecure. Telnet was impossible to encrypt as in FTP (File transfer protocol). Secure Shell (SSH) replace telnet.
The Netstat command gives the status of ou are hooked up to.
NAT= Network Address Translation
PAT= Port Address Translation (share 1 external IP) D.O.L.L.S. Diversity – Don’t run 1 kind of protection. Example: Different password types, SW OS, mix up servers Obscurity- Hide your information! Ex: OS, Apps, Internal Addresses (NAT/PAT) Limiting – Limit physical access. Ex: Role Based Access Controls (RBAC)/IBAC, privileges Layering – Have multiple obstacles Simplicity- Usability built into the system Ex. Biometrics, management tools
· Security Increase, Productivity Decreases
Passwords Formula = (symbol)Length ASCII are a string of 8 bits that equal a character. The strongest password is random! Types of Attacks · Guess (default password, familiar names,ect) · Dictionary (words, names) · Brute Force (every possible combination of symbols) · Rainbow Table (list of passwords up to a certain length – hash) Passphrase : A sequence that makes sense to you and no one else
The purpose of Telenet is to remote login. It is insecure. Telnet was impossible to encrypt as in FTP (File transfer protocol). Secure Shell (SSH) replace telnet.
The Netstat command gives the status of ou are hooked up to.
NAT= Network Address Translation
PAT= Port Address Translation (share 1 external IP)
D.O.L.L.S.
Diversity – Don’t run 1 kind of protection. Example: Different password types, SW OS, mix up servers
Obscurity- Hide your information! Ex: OS, Apps, Internal Addresses (NAT/PAT)
Limiting – Limit physical access. Ex: Role Based Access Controls (RBAC)/IBAC, privileges
Layering – Have multiple obstacles
Simplicity- Usability built into the system Ex. Biometrics, management tools
· Security Increase, Productivity Decreases
Passwords
Formula = (symbol)Length
ASCII are a string of 8 bits that equal a character.
The strongest password is random!
Types of Attacks
· Guess (default password, familiar names,ect)
· Dictionary (words, names)
· Brute Force (every possible combination of symbols)
· Rainbow Table (list of passwords up to a certain length – hash)
Passphrase : A sequence that makes sense to you and no one else